{"id":17761,"date":"2020-03-18T14:57:28","date_gmt":"2020-03-18T13:57:28","guid":{"rendered":"https:\/\/beta.cybus.io\/din-spec-27070-realising-the-iiot-security-reference-architecture\/"},"modified":"2023-01-23T10:24:04","modified_gmt":"2023-01-23T09:24:04","slug":"din-spec-27070-realising-the-iiot-security-reference-architecture","status":"publish","type":"post","link":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/","title":{"rendered":"DIN SPEC 27070 &#8211; Realising the IIoT Security Reference Architecture"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">At Cybus we believe that the security question will make or break the success of the Industrial IoT overall. Reliable security requires that factory operators can define and control their own data distribution principles. That\u2019s precisely what Cybus Connectware enables. Our systematic approach forms the ideal core to a comprehensively secure and standardised IIoT architecture that everybody can rely on.<br>Drumroll please \u2013 This standardisation has just materialised in a brand new DIN (Deutsche Industrie Norm). The IDSA, the\u00a0<a href=\"https:\/\/www.internationaldataspaces.org\/\">International Data Space Association<\/a>, has released DIN SPEC 27070 which details IIoT security requirements and offers a reference architecture for secure gateways for the exchange of industry data and services.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>This is huge progress for the legal and commercial viability of Industrial IoT use cases. <\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The IDSA reference architecture is the much needed reliable guidance for all who understand the strategic value of their data and who take the security of their operations seriously.<br>That said, it\u2019s also clear that IT architecture is a complex beast. Realising the IDSA recommendations immediately and in its entirety is hardly realistic for most organisations. So, how should you go about it?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Here\u2019s where Cybus comes into play as offering the effective and pragmatic path:<\/strong><\/h3>\n\n\n\n<h4 class=\"is-style-arrow-list wp-block-heading\"><strong>Cybus Connectware is fully IDSA compliant and in fact its functionality forms the centerpiece to the DINSPEC 27070 reference architecture.<\/strong><\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cIf we start with Cybus Connectware, it means we\u2019re already more than half-way there\u2026 The good old 80\/20 rule. We\u2019re structurally set up in the right way and ready to go \u2013 and we can simply implement more DIN SPEC recommendations as and when we need it.\u201d<br>This is how one customer put it. And it\u2019s just that. Our Marketing could not have said it any better.<\/p>\n\n\n\n<h4 class=\"is-style-arrow-list wp-block-heading\"><strong>As a Unified Gateway you can use your Cybus Connectware with just about any machine in your park very quickly. Minimises admin time and eliminates risk factors.<\/strong><\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Cybus Connectware has lots of industry-relevant connectors pre-built in. You can find a complete list here and we\u2019re constantly adding more. For example we\u2019ve just recently realised the most comprehensive implementation of connectors for Heidenhein machines, worldwide.<br>Your IIoT managers will love that they have to manage fewer gateways \u2013 or even just one. And your OT colleagues will be delighted as well because with Cybus Connectware broadly established solutions like Kepware can simply be continued.<\/p>\n\n\n\n<h4 class=\"is-style-arrow-list wp-block-heading\"><strong>As a full-featured MSB (Manufacturing-Service-Bus) Cybus Connectware gets you comprehensive Access Control Policy Management.<\/strong><\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">This means you get complete control over data access, data path and data flow for exactly the services that you actively allow. No matter whether these live in a private or public cloud (e.g. AWS, Azure), a 3rd party platform (e.g. SAP, Siemens Mindsphere) or on your own physical server right next door. It\u2019s your data and your rules. You decide before anything goes anywhere. And equally before anyone can reach deep down into your machine data or even control your machines and thereby your production. You keep the overview and stay in control. It\u2019s that clear.<\/p>\n\n\n\n<h4 class=\"is-style-arrow-list wp-block-heading\"><strong>The Unified Gateway approach also creates a technology-neutral layer that protects you from technical or commercial dependencies, too.<\/strong><\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Which means a strategic level of independence and security in your engagement with otherwise dominant platforms or partners. CIOs and corporate strategists love it.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So, these are just four ways how you can leverage Cybus Connectware and the IDSA DIN SPEC 27070 to overcome critical hurdles to your IIoT business. Cybus Connectware offers you a fast, effective and cost efficient way forward. It also ensures that you have a core in your architecture that gets you the systematic freedom that you\u2019ll need for whatever the future brings.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Learn more about Cybus Connectware<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">As an active member of the International Data Space Association, Cybus is proud to have directly and significantly contributed to the DIN SPEC 27070. We know this inside out. If you\u2019re interested in the specific IDSA recommendations, the reference architecture itself and what Cybus Connectware can mean for your business, <a href=\"https:\/\/www.cybus.io\/en\/contact\/\">don\u2019t hesitate to contact us<\/a>. We\u2019re more than happy to help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybus is DIN SPEC 27070 compliant and sets new standards in terms of safety.<\/p>\n","protected":false},"author":5,"featured_media":18324,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[154],"tags":[],"class_list":["post-17761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DIN SPEC 27070 - Realising the IIoT Security Reference Architecture | Cybus.io<\/title>\n<meta name=\"description\" content=\"The IDSA, the\u00a0International Data Space Association, has released DIN SPEC 27070 which details IIoT security requirements and offers a...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DIN SPEC 27070 - Realising the IIoT Security Reference Architecture\" \/>\n<meta property=\"og:description\" content=\"The IDSA, the\u00a0International Data Space Association, has released DIN SPEC 27070 which details IIoT security requirements and offers a...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybus.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybusgmbh\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-18T13:57:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-23T09:24:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/cyber-security-din-spec-27070.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lara Ludwigs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cybus_io\" \/>\n<meta name=\"twitter:site\" content=\"@cybus_io\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/\"},\"author\":{\"name\":\"Lara Ludwigs\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#\\\/schema\\\/person\\\/7dd0dcc74d898241116e06f83829f1ab\"},\"headline\":\"DIN SPEC 27070 &#8211; Realising the IIoT Security Reference Architecture\",\"datePublished\":\"2020-03-18T13:57:28+00:00\",\"dateModified\":\"2023-01-23T09:24:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/\"},\"wordCount\":689,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/cyber-security-din-spec-27070.jpeg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/\",\"url\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/\",\"name\":\"DIN SPEC 27070 - Realising the IIoT Security Reference Architecture | Cybus.io\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/cyber-security-din-spec-27070.jpeg\",\"datePublished\":\"2020-03-18T13:57:28+00:00\",\"dateModified\":\"2023-01-23T09:24:04+00:00\",\"description\":\"The IDSA, the\u00a0International Data Space Association, has released DIN SPEC 27070 which details IIoT security requirements and offers a...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/cyber-security-din-spec-27070.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/cyber-security-din-spec-27070.jpeg\",\"width\":780,\"height\":400,\"caption\":\"Highest security with DIN SPEC 27070 with Cybus Connectware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/din-spec-27070-realising-the-iiot-security-reference-architecture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DIN SPEC 27070 &#8211; Realising the IIoT Security Reference Architecture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/\",\"name\":\"Cybus.io\",\"description\":\"Real-time data flow for the Manufacturing Industry\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#organization\",\"name\":\"Cybus GmbH\",\"alternateName\":\"Cybus\",\"url\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cropped-cybus-logo-bildmarke300x290.png\",\"contentUrl\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cropped-cybus-logo-bildmarke300x290.png\",\"width\":512,\"height\":512,\"caption\":\"Cybus GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybusgmbh\\\/\",\"https:\\\/\\\/x.com\\\/cybus_io\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybus\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCkp33a41zYUZ1QwilQtfAUQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#\\\/schema\\\/person\\\/7dd0dcc74d898241116e06f83829f1ab\",\"name\":\"Lara Ludwigs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g\",\"caption\":\"Lara Ludwigs\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DIN SPEC 27070 - Realising the IIoT Security Reference Architecture | Cybus.io","description":"The IDSA, the\u00a0International Data Space Association, has released DIN SPEC 27070 which details IIoT security requirements and offers a...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/","og_locale":"en_US","og_type":"article","og_title":"DIN SPEC 27070 - Realising the IIoT Security Reference Architecture","og_description":"The IDSA, the\u00a0International Data Space Association, has released DIN SPEC 27070 which details IIoT security requirements and offers a...","og_url":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/","og_site_name":"Cybus.io","article_publisher":"https:\/\/www.facebook.com\/cybusgmbh\/","article_published_time":"2020-03-18T13:57:28+00:00","article_modified_time":"2023-01-23T09:24:04+00:00","og_image":[{"width":780,"height":400,"url":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/cyber-security-din-spec-27070.jpeg","type":"image\/jpeg"}],"author":"Lara Ludwigs","twitter_card":"summary_large_image","twitter_creator":"@cybus_io","twitter_site":"@cybus_io","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/#article","isPartOf":{"@id":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/"},"author":{"name":"Lara Ludwigs","@id":"https:\/\/www.cybus.io\/en\/#\/schema\/person\/7dd0dcc74d898241116e06f83829f1ab"},"headline":"DIN SPEC 27070 &#8211; Realising the IIoT Security Reference Architecture","datePublished":"2020-03-18T13:57:28+00:00","dateModified":"2023-01-23T09:24:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/"},"wordCount":689,"publisher":{"@id":"https:\/\/www.cybus.io\/en\/#organization"},"image":{"@id":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/cyber-security-din-spec-27070.jpeg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/","url":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/","name":"DIN SPEC 27070 - Realising the IIoT Security Reference Architecture | Cybus.io","isPartOf":{"@id":"https:\/\/www.cybus.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/#primaryimage"},"image":{"@id":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/cyber-security-din-spec-27070.jpeg","datePublished":"2020-03-18T13:57:28+00:00","dateModified":"2023-01-23T09:24:04+00:00","description":"The IDSA, the\u00a0International Data Space Association, has released DIN SPEC 27070 which details IIoT security requirements and offers a...","breadcrumb":{"@id":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/#primaryimage","url":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/cyber-security-din-spec-27070.jpeg","contentUrl":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/cyber-security-din-spec-27070.jpeg","width":780,"height":400,"caption":"Highest security with DIN SPEC 27070 with Cybus Connectware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cybus.io\/en\/din-spec-27070-realising-the-iiot-security-reference-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.cybus.io\/en\/"},{"@type":"ListItem","position":2,"name":"DIN SPEC 27070 &#8211; Realising the IIoT Security Reference Architecture"}]},{"@type":"WebSite","@id":"https:\/\/www.cybus.io\/en\/#website","url":"https:\/\/www.cybus.io\/en\/","name":"Cybus.io","description":"Real-time data flow for the Manufacturing Industry","publisher":{"@id":"https:\/\/www.cybus.io\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cybus.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cybus.io\/en\/#organization","name":"Cybus GmbH","alternateName":"Cybus","url":"https:\/\/www.cybus.io\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cybus.io\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/03\/cropped-cybus-logo-bildmarke300x290.png","contentUrl":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/03\/cropped-cybus-logo-bildmarke300x290.png","width":512,"height":512,"caption":"Cybus GmbH"},"image":{"@id":"https:\/\/www.cybus.io\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cybusgmbh\/","https:\/\/x.com\/cybus_io","https:\/\/www.linkedin.com\/company\/cybus\/","https:\/\/www.youtube.com\/channel\/UCkp33a41zYUZ1QwilQtfAUQ"]},{"@type":"Person","@id":"https:\/\/www.cybus.io\/en\/#\/schema\/person\/7dd0dcc74d898241116e06f83829f1ab","name":"Lara Ludwigs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g","caption":"Lara Ludwigs"}}]}},"_links":{"self":[{"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/posts\/17761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/comments?post=17761"}],"version-history":[{"count":0,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/posts\/17761\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/media\/18324"}],"wp:attachment":[{"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/media?parent=17761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/categories?post=17761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/tags?post=17761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}